SLIDE 1 Usi sing Dig g Digit ital al For
ensi sics cs to to Id Iden enti tify & I y & Inves esti tiga gate te Fr Frau aud
Pr Present nter: Damon
cker, MBA, , CCE, E, CISA SA Preside ident Vestige ige Digit igital I l Inv nves estiga igations tions
SLIDE 2 Ves ●tige (véŝ tĭj) n. 1. A visible trace, evidence or sign of something that has once existed but now no longer exists or appears.
SLIDE 3 Overview
- Open Your Eyes
- Real-World Scenarios
- What Computer Forensics Can and Cannot Do
- Forensic Techniques Overview/Primer
- What You Need to Know
- Q&A
SLIDE 4 Xerox DocuColor 12 page, magnified 10x and photographed by the QX5 microscope under illumination from a Photon blue LED flashlight
SLIDE 5
SLIDE 6 Scenarios
- Real-World Examples
- Vestige Involved
- Some Information is in Public Domain, Most is Not.
- Information Changed to Protect the identities of those involved.
- May be a compilation of more than one case to make a specific point or further protect
identities.
SLIDE 7 Scenario 1
- The Scene:
- Wrongful Termination lawsuit
- Sending of “over-the-top” e-mails
- Two places at once?
SLIDE 8
SLIDE 9
SLIDE 10
So, , where do we turn?
SLIDE 11 I.T.’s Findings
Deposition ends: 11:15am in Detroit
SLIDE 13
- Registration/Login
- Payment Method
- Surveillence
Kinko’s Kooperates
SLIDE 14
Results
SLIDE 15 Scenario 2
- Tail-end of litigation
- Plaintiff wins matter and is awarded attorneys fees
- Disparate amounts spent between plaintiff & defendant
- Defendant’s counsel believes Plaintiff’s counsel has “stuffed” time
entry
SLIDE 16 Scenario 2
- Review of Time & Billing Software
- No apparent manipulation
- Chronology looked appropriate
- Defendant’s analysis concluded no manipulation.
SLIDE 17 Scenario 2
- Vestige Analysis
- Review of database, behind-the-scenes
- Time & Billing software uses off-the-shelf back-end database,
albeit not a common one
- Vestige tools to review data at database level
- Vestige created “parsing” utility to extract and review deleted
records
SLIDE 18 Scenario 2
- Analysis reviewed approximately 40% overbilling occurring
- “Stuffing” time entries sequentially at end of case
- Replacement entries that were 2x-10x the amount of the deleted
entries they replaced
SLIDE 19 Scenario 3
- $30 Million shortage in commodities
- $3 Billion company
- 3000+ employees
- 100s of thousands financial transactions
- No initial persons of interest
Hypothesis: Internal controls would require collusion to pull off fraud. Individuals ought to be communicating with one another.
SLIDE 20 Scenario 3
1. Take backup tape from email system last year 2. Take backup tape from email system last month 3. Index every word and frequency per user 4. Import word Index, frequency per user, and frequency count into Excel 5. Using Excel calculate median frequency per user for each word 6. Identify words having frequency per user far greater than median
- Led to determination of “do you want cheese with that?”
in excess of 2000% greater than median frequency for 3 individuals
SLIDE 21 Scenario 3
- Requests for financial statements accompanied by
“Do you want cheese with that?”
- Innocuous sounding word/phrase
- Not in selection set for typical keyword search
SLIDE 22 Scenario 4
- Stolen Laptops
- Law Enforcement’s involvement
- Stupidity at its finest
SLIDE 23 Scenario 5
- Wage/Hour Class Action
- Non-Exempt classified as Exempt
- Timeframe stretches back 3-4 years
SLIDE 24
By the Numbers
Fraud Statistics
SLIDE 25 Typical Fraud
- Typical organization loses 5% of annual revenues to various frauds
- $6.3 TRILLION issue worldwide
- Median loss $150,000
- In 94.5% of cases in study, perpetrator took efforts to conceal the
fraud!
Source: 2016 Report to the Nations on Occupational Fraud and Abuse. The Association of Certified Fraud Examiners
SLIDE 26 Detecting Fraud
- Time to detection – median is 18 months
- How Fraud was Detected:
- Tip – 39.1%
- Internal Audit – 16.5%
- Management Review – 13.4%
- By Accident – 5.6%
- Account Reconciliation – 5.5%
- External Audit – 3.8%
SLIDE 27 Controls
- Strong linkage between anti-fraud controls:
- Significant decrease in cost
- Decrease in duration of time-to-detection
SLIDE 28 Perpetrator
- 94.5% are first-time offenders
- Clean employment history
- No criminal background
- 79% of cases, perpetrator exhibited “red flag” behavior
- Living beyond means
- Financial Difficulties
- Unusually close association with vendors/clients
- Excessive control issues/wheeler-dealer attitude
- Recent divorce / family problems
SLIDE 29 Why People Commit Fraud
Rationalization
SLIDE 30 In Intersection of f Technology & Fraud
- Opportunity
- Majority of financial transactions are Technology-linked
- Less tangible – belief its harder to get caught
- Availability of software
- Personal accounting software
- Document alteration
- Access to information
- Research on techniques & cover-up
SLIDE 31
What Dig igit ital Forensics Can and Cannot Do
SLIDE 32
SLIDE 33 What you can expect
- Content
- Keyword search for content/communication
- ALL correspondence
- Hidden information
- Deleted information
- Orphaned information
- Encrypted information
SLIDE 34
- Correspondence
- Memos
- Emails
- Instant messages
- Faxes
- Deleted
- Old and forgotten
SLIDE 35
- Business Records
- Financial data
- Assets
- Calculations
- PRIOR DRAFTS
- DELETED DRAFTS
- Projections
- Everything you could imagine
SLIDE 36
- Every Website visited
- All pictures from those
websites
popups and popunders
Mapquest for example
SLIDE 37
Every INTERNET SEARCH & the Search Results
SLIDE 38 What you can expect
- Conceptual Analysis
- How the computer was used
- IM activity – dates/times, frequency, who
- E-mails – activity
- Web-based E-mails
- Deletion activity
- Wiping activity
- Software installed
- File Transfers
- CD/DVD burning
- Attached hardware
- Other networks attached
- Remote Access activity
- Do we have the “Right” system?
SLIDE 39 What you can expect
- Condition of evidence
- Used by others
- Formatted
- Re-partitioned
- Damaged
- Wiped/Cleansed/Sanitized
SLIDE 40 What Digital Forensics Can’t Do
- Find evidence that isn’t there
- Never was on this evidence
- May have been on this evidence but was overwritten
- Wrong Interpretations
- Artifact analysis
- Example: Defragmenting
- “Who was at the keyboard?”
Some analysis will allow the answer to be inferred.
SLIDE 41
Sample Case
SLIDE 42
What You Need to Know
SLIDE 43 Locard’s Exchange Pri rinciple
“In forensic science, Locard’s principle holds that the perpetrator of a crime will bring something into the crime scene and leave with something from it – both of which can be used as forensic evidence.”
SLIDE 44 Sources vs Documents
- Identify Appropriate “Key” Devices
- Key-players
- Expanded Key-players
- Administrative Assistants
- Other likely correspondents, etc.
- Observing Devices
- Monitors, surveillance
- Pass-Thru Devices
- Routers, firewalls, servers, monitoring systems
- Passive Devices
- i.e. conveyor
SLIDE 45 Evidence Vola latility
- Rate at which evidence disappears
Registers, Cache Memory, Routing Tables, Process Tables Temporary Files Disk & Other “permanent” storage Logging & Monitoring Data Archives
SLIDE 46 Potential Sources
- ISP
- Router
- Firewall
- IDS/IPS
- Managed Switches
- Servers
- Workstations
- Other monitoring devices
(alarm system)
- Log files
- GPS
- Cell Tower Data
- Syslog
- Honeypot
- Virtual Machines
- Cloud Service
- General Network Sniffers
- Backup tapes/disks
- Replication sites
- Disaster Recovery sites
- Digital Scale & other Measuring Devices
- RFID Data
- “Black Boxes”
- Video Surveillance
- Payment or other Registration Info
SLIDE 47
Methodology
SLIDE 48 Acquisition Authentication Analysis Presentation
SLIDE 49 Acquisition
- First & Foremost: Evidence Preservation
- Admissibility in Court
- Protection of All Parties Involved…
even the investigator
- Avoid Contamination/Spoliation of Evidence
SLIDE 50 Acquisition
- Completeness
- “The Whole Truth”
- Used & Unused (Unallocated) Space
- Active & Inactive Systems
- Seemingly “Inaccessible” Systems & Media
SLIDE 51 Acquisition
- Methodology
- Forensically-sound Bit-for-Bit Clone
- Copy, clone, mirror
- Write-protect
- Place on Sterile Media
- MD5 or other authentication hash
- Chain of Custody
- Seal Evidence
SLIDE 52 Authentication
- Authenticate:
- Prove “no change”
- Prove Clones ARE the Same
- Method
- MD5 Hash (digital fingerprint)
- Industry-standard, industry-recognized
- 128-bit
- 1 in 1x1038 chance for deceiving
- 1 in 100,000,000,000,000,000,000,000,000,000,000,000,000
- DNA Evidence is 1 in 1,000,000,000
SLIDE 53 Authenticate
- Our Methodology
- MD5 Hash – Digital Fingerprint
702865f9ebd7478fbab050ed6b4612f0 MD5
SLIDE 54 Authenticate
- Prove copies (working) are the same
702865f9ebd7478fbab050ed6b4612f0 702865f9ebd7478fbab050ed6b4612f0
COPY
SLIDE 55 Authenticate
- Prove nothing has changed
702865f9ebd7478fbab050ed6b4612f0 702865f9ebd7478fbab050ed6b4612f0
SLIDE 56 Analysis
- Leave No Stone Unturned
- Used (active) space
- Unused (inactive/unallocated) space
- Slack space
- Deleted – partially, separation of metadata and content
- Artifacts
- Printed documents
- E-mail / IM / chat sessions
- Internet History
SLIDE 57 Analysis
- Hiding activity
- Encryption
- Mismatched document types
- Steganography
- Date Analysis
- MAC Dates
- Metadata
SLIDE 58 Analysis
- Installed Software
- Use of software
- Installed
- Permissions
- First Use
- Last Use
- Registration
- Settings
- Number of times used / Frequency of use
- Removed Software
SLIDE 59 Analysis
- Hardware
- Installed hardware
- Removed hardware
SLIDE 60 Analysis
- Nefarious Activities
- Wiping
- Encryption
- Booby Traps
- Analysis of “Trojan Defense”
SLIDE 61 Beyond Sampling…
Advanced Analytics to Find the Needle in the Haystack
SLIDE 62 Vir irtualization
- Run the application as intended
- Sometimes the only solution
- Allows for reverse-engineering
- Testing of artifacts
SLIDE 63 Behind-the-Scenes
- But…
- The most valuable information comes from
what we can gain access to apart from the constraints of the application and its interface.
SLIDE 64 Structure of f Accounting Systems
- Front-end Application
- Back-end Data
- Standard Database
- Proprietary Database
SLIDE 65 CAATTs
- Computer Assisted Audit Tools & Techniques
- Use of computers to automate process
- Specialized software tools
- ACL, IDEA, Picalo
- General data manipulation software tools
- Excel, Access, SQL db, SAS
SLIDE 66
Statistical Approach
SLIDE 67 Anomalies
- Duplicates
- Threshold Analysis
- Outliers
SLIDE 68 Statistical Approach
- General Fingerprinting
- Min / Max
- Mean / Median
- Standard Deviation / Distribution
- Three Tools
- Data Profile
- Data Histogram
- Periodic Graph
SLIDE 69 Statistical Approach
- 3 Tools – What do they tell us?
- Data Completeness
- Negative (contra) amounts
- High proportion of high-value / low-value transactions
- Presence of Zero transactions
- Detect possible deviances
SLIDE 70 Example
- Simple
- AP Check Register
- Data Profiling
- Missing checks
- Duplicate checks
- Threshold analysis
- Outlier analysis
SLIDE 71
SLIDE 72
SLIDE 73
SLIDE 74 Traditional Approach vs. . Analytics
- Analytics
- Relating Disparate Data
- Examples:
- Vendor EIN to HR database of employee’s SSN
- Addresses to employee’s addresses
- Related Disparate Sources
- Examples:
- EIN numbers against known invalid SSNs (i.e. IRS’ list of invalid SSNs, deceased individuals)
SLIDE 75 Traditional Approach vs. . Analytics
- Analytics
- Pattern Recognition
- Transactions just under signing threshhold
- Transactions processed on Sat/Sun
- Transactions processed after H:MM
- Number of transactions processed
- Large transactions to new vendor
- Analytics
- Benford’s Law
- TF/IDF
SLIDE 76
Work rking wit ith Raw Data
SLIDE 77
Fin inding Dupli licates
SLIDE 78
Repeat Transactions
SLIDE 79
Threshold Analysis
SLIDE 80 Day of f Week Analysis
Not Transaction Date
SLIDE 81
SLIDE 83 Analysis
- Data not available through Interface
- Processing data
- Autoincrement / Index fields
- Additional Audit Trail information
- Check Register vs Check Images
SLIDE 84 Analysis
- Deleted Database Records
- Consistent amongst most databases
- Until “packed” or “compressed”
- Recoverable with the right tools & know-how
- Some applications (especially financial) may maintain
multiple audit/change logs
SLIDE 85 Analysis
- Simple Linking
- Disbursement to PO Amount Comparison
- Link 2 data sources
SLIDE 86 Analysis
- More Complex
- Financial System – Vendor Addresses
- HRIS – Employee Addresses
- Examples
- Vendors with same TIN as EE SSN
- Vendors with addresses same as EE
- Multiple vendors from same address
SLIDE 87 Social Network Analysis
- Relationships
- Reciprocal Relationships
- Weighted Relationship
- How Much
- How Frequent
- Closeness
- Density
- Connectivity
SLIDE 88
Social Network Analysis
SLIDE 89 Fin inding the Needle in in the Haystack
- Oftentimes there’s a “feeling” that something is amiss
- No hard evidence
- Actors are unknown
- Schemes are unknown
- Scope of problem is unknown
SLIDE 90 Fin inding the Needle in in the Haystack
- Keywords?
- Just a guess
- Bad keywords
- Fraud, embezzlement, steal
- “Follow the cash”
- Will work – but is tedious
- Obscurity through Complexity
SLIDE 91 Analysis
- Analysis Tools
- Benford’s Analysis
SLIDE 93 What about Contextual Analysis?
- Introducing the TF/IDF
- Term Frequency
- Inverse Document Frequency
- Document can be substituted with custodian
SLIDE 94
TF/ID IDF – In Information Retrieval Theory ry
SLIDE 95 Analysis
- Analysis Tools
- Benford’s Analysis
- Pajek: Social Network
Analysis
- Statistical Analysis: Excel,
Access, mySQL
SLIDE 96 Summary ry
- Data can exist as Active and Deleted
- Content vs Artifact
- Fraud is a huge issue and increasingly problematic
- Scope is difficult to ascertain initially
- Traditional approaches lack ability to quickly and effectively pinpoint
issues
- Statistical analysis can greatly assist in this area
SLIDE 97 Clo losing Thoughts
A: Involve a Digital Forensic Expert early
- Ability to plan discovery strategy
- Ensure admissibility
- Work closely with client
Q: What to do when faced with Electronic Data?
SLIDE 98
And the # 1 reason…
If you think hiring an Expert is expensive… wait until you’ve hired an amateur!
SLIDE 99 Damon S. Hacker, MBA, CCE, CISA Cleveland | Columbus | Pittsburgh | National Coverage 800-314-4357 dhacker@vestigeltd.com www.VestigeLtd.com
Vestige Digital Investigations
Electronic Evidence Experts
We Turn Digital Evidence into Intelligence™